Bitcoin surges after accidentally released Treasury statement


Bitcoin surges after accidentally released Treasury statement



Prices of Bitcoin and other cryptocurrencies have soared following the apparent accidental release of a U.S. Treasury statement on Bidenโ€™s expected executive order on digital assets.

The premature statement by Treasury Secretary Yellen, which was dated March 9, hasย since been removed.

โ€œPresident Bidenโ€™s historic executive order calls for a coordinated and comprehensive approach to digital asset policy.ย  This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses.ย 

It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.โ€

Quote from the now deleted statement

At the time of writing, Bitcoin is up nearly 8% in the last 24 hours.

Bidenโ€™s executive order aims to regulate the crypto market while also reaping the benefits of digital currencies.

So far, like most countries in the world, the US has tended to react to developments and has limited itself to pointing to a political-economic approach that is yet to be developed.


Statement by Secretary of the Treasury Janet L. Yellen on President Biden’s Executive Order on Digital Assets


March 9, 2022

WASHINGTON –ย  U.S. Secretary of the Treasury Janet L. Yellen released the following statement on President Biden’s executive order on digital assets.ย 

“President Bidenโ€™s historic executive order calls for a coordinated and comprehensive approach to digital asset policy.ย  This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses.ย  It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.

Under the executive order, Treasury will partner with interagency colleagues to produce a report on the future of money and payment systems. Weโ€™ll also convene the Financial Stability Oversight Council to evaluate the potential financial stability risks of digital assets and assess whether appropriate safeguards are in place. And, because the questions raised by digital assets often have important cross-border dimensions, weโ€™ll work with our international partners to promote robust standards and a level playing field.

This work will complement ongoing efforts by Treasury. Already, the Department has worked with the Presidentโ€™s Working Group on Financial Markets, the FDIC, and OCC to study one particular kind of digital asset โ€“ stablecoinsโ€“ and to make recommendations. Under the executive order, Treasury and interagency partners will build upon the recently published National Risk Assessments, which identify key illicit financing risks associated with digital assets.ย 

As we take on this important work, weโ€™ll be guided by consumer and investor protection groups, market participants, and other leading experts. ย Treasury will work to promote a fairer, more inclusive, and more efficient financial system, while building on our ongoing work to counter illicit finance, and prevent risks to financial stability and national security.”


Sources:

https://forbes.com/

https://disclose.tv/

https://bloomberg.com/

https://web.archive.org/web/20220309014601/https://home.treasury.gov/news/press-releases/jy0643




With ๐Ÿ’š

ASICs vs. SuperComputers

Asics
SuperComputers

ASICs vs Supercomputers


Assigning the most powerful supercomputer to mine bitcoin would be comparable to hiring a grandmaster chess player to move a pile of bricks by hand.

The job would get done eventually but the chess player is much better at thinking and playing chess than exerting energy to repetitively move bricks.ย 

Likewise, combining the computing power of the most powerful supercomputers in the world and using them to mine bitcoin would essentially be pointless when compared to the ASIC machines used today.

ASICs are designed to do one thing as quickly and efficiently as possible, whereas a supercomputer is designed to do complicated tasks or math problems.

Since Bitcoin mining is a lottery based on random trial and error rather than complex math, specialization (ASICs) beats general excellence (supercomputers) everytime.


End of Lesson !!!



Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š



With ๐Ÿ’š

Veritas … In pictures…



Gold is Money…

Uni-Verse

Success



Genes that erase memories

Researches can erase painful memories from the brain


Pokemon Go users give away all privacy rights




Compounding Interest






Play the role of a fool…

Occult – Anatomy

20 Fastest Growing + Declining Jobs

Causes and Effects of Inflation

The History of Logistics

SSG 16.9 – Legal Identity for all

Scientists call for Protection from Non-Ionizing Electromagnetic Field Exposure

Protest’s are Illegal and punished with Jail Time in a “Free” Society !!!?ยฟ!!!

Human Value Chain

Opposition to the use of Blockchain Identity – Part 1

Opposition to the use of Blockchain Identity – Part 2

Human Capital Performance Bond

Strategies for Investing in Undervalued Human Capital

U.S Army TRADOC G-2

Digitizing Government-to-Person (G2P) Payments

Will be Always Updated !!!


Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š


Totalitarian Governments..

Totalitarianismย is aย form of governmentย andย political systemย that prohibits all opposition parties, outlaws individual opposition to theย stateย and its claims, and exercises an extremely high degree of control and regulation over public and private life.

It is regarded as the most extreme and complete form ofย authoritarianism.

In totalitarian states,ย political powerย is often held byย autocrats, such asย  dictatorsย  andย absolute monarchs, who employ all-encompassing campaigns in whichย propagandaย is broadcast by state-controlledย mass mediaย in order to control the citizenry.

It remains a useful word but the old 1950s theory was considered to be outdated by the 1980s,and is defunct among scholars.

The proposed concept gained prominent influence in Western anti-communist andย McCarthyistย political discourse during theย Cold Warย era as a tool to convert pre-World War IIanti-fascismย into post-warย anti-communism.


Leaders who have been described as totalitarian rulers, from left to right and top to bottom in picture, includeย Joseph Stalin, formerย General Secretary of the Communist Party of the Soviet Union;ย Adolf Hitler, formerย Fรผhrerย ofย Nazi Germany;ย Augusto Pinochet, formerย Presidentย ofย Chile;ย Mao Zedong, formerย Chairman of the Communist Party of China;ย Benito Mussolini, formerย Duceย ofย Fascist Italy; andย Kim Il-sung, theย Eternal President of the Republicย ofย North Korea

As aย political ideologyย in itself, totalitarianism is a distinctly modernistย  phenomenon, and it has very complex historical roots. Philosopherย Karl Popperย traced its roots toย Plato,ย Georg Wilhelm Friedrich Hegel‘s conception of theย state, and the political philosophy ofย Karl Marx, although Popper’s conception of totalitarianism has been criticized in academia, and remains highly controversial.

Other philosophers and historians such asย Theodor W. Adornoย andย Max Horkheimerย trace the origin of totalitarian doctrines to theย Age of Enlightenment, especially to theย anthropocentristย idea that:

“Man has become the master of the world, a master unbound by any links to nature, society, and history.”

In the 20th century, the idea of absolute state power was first developed byย Italian Fascists, and concurrently in Germany by a jurist andย Naziย academic namedย Carl Schmittย during theย Weimar Republicย in the 1920s.

Benito Mussolini, the founder of Italian Fascism, defined fascism as such: “Everything within the state, nothing outside the state, nothing against the state.”

Schmitt used the termย Totalstaatย (lit.โ€‰’Total state’) in his influential 1927 work titledย The Concept of the Political, which described the legal basis of an all-powerful state.

Totalitarian regimes are different from otherย authoritarianย regimes, as the latter denotes a state in which the single power holder, usually an individual dictator, a committee, aย military junta, or an otherwise small group of political elites, monopolizes political power.

A totalitarian regime may attempt to control virtually all aspects of social life, including the economy, the education system, arts, science, and the private lives and morals of citizens through the use of an elaborate ideology. It can also mobilize the whole population in pursuit of its goals.

Definition

Totalitarian regimes are often characterized by extremeย political repression, to a greater extent than those of authoritarian regimes, under an undemocratic government, widespreadย personality cultismย around the person or the group which is in power, absoluteย control over the economy, large-scaleย censorshipย andย mass surveillanceย systems, limited or non-existentย freedom of movementย (the freedom to leave the country), and the widespread usage ofย state terrorism.

Other aspects of a totalitarian regime include the extensive use ofย internment camps, an omnipresentย secret police, practices ofย religious persecutionย orย racism, the imposition ofย theocraticย rule orย state atheism, the common use ofย death penaltiesย andย show trials, fraudulent elections (if they took place), the possible possession ofย weapons of mass destruction, a potential for state-sponsoredย mass murdersย andย genocides, and the possibility of engaging in aย war, orย colonialismย against other countries, which is often followed byย annexationย of their territories.

Historianย Robert Conquestย describes a totalitarian state as a state which recognizes no limit on its authority in any sphere of public or private life and extends that authority to whatever length it considers feasible.

Totalitarianism is contrasted withย authoritarianism. According to Radu Cinpoes, an authoritarian state is “only concerned with political power, and as long as it is not contested it gives society a certain degree of liberty.”

Cinpoes writes that authoritarianism “does not attempt to change the world and human nature.”

In contrast,ย Richard Pipesย stated that the officially proclaimedย ideologyย “penetrating into the deepest reaches of societal structure, and the totalitarian government seeks to completely control the thoughts and actions of its citizens.”

Carl Joachim Friedrichย wrote that “[a] totalist ideology, a party reinforced by aย secret police, and monopolistic control of industrial mass society are the three features of totalitarian regimes that distinguish them from other autocracies.”



Visualization of the AES round function

Advanced Encryption Standard

Theย Advanced Encryption Standardย (AES), also known by its original nameย Rijndaelย (Dutch pronunciation:ย [หˆrษ›indaหl]), is a specification for theย encryptionย of electronic data established by the U.S.ย National Institute of Standards and Technologyย (NIST) in 2001.

AES is a variant of the Rijndaelย block cipher developed by twoย  Belgianย  cryptographers, Vincent Rijmenย andย Joan Daemen, who submitted a proposalto NIST during theย AES selection process.

Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

AES has been adopted by theย U.S. government. It supersedes theย Data Encryption Standardย (DES), which was published in 1977.

The algorithm described by AES is aย symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

In the United States, AES was announced by the NIST as U.S.ย FIPSย PUB 197 (FIPS 197) on November 26, 2001.

This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the most suitable.

AES is included in theย ISO/IECย 18033-3ย  standard. AES became effective as a U.S. federal government standard on May 26, 2002, after approval by the U.S.ย Secretary of Commerce.

AES is available in many different encryption packages, and is the first (and only) publicly accessibleย cipherย approved by the U.S.ย National Security Agencyย (NSA) forย top secretย information when used in an NSA approved cryptographic module.



Andreas M. Antonopoulosย (born 1972 in London) is a British-Greek Bitcoinย advocate, tech entrepreneur, and author.

He is a host on theย Speaking of Bitcoinย podcastย (formerly calledย Let’s Talk Bitcoin!) and a teaching fellow for theย M.Sc.ย Digital Currencies at theย University of Nicosia.

Antonopoulos was born in 1972 in London, UK, and moved to Athens, Greece during theย Greek Junta.

He spent his childhood there, and at the age of 17 returned to the UK.

Antonopoulos obtained his degrees inย Computer scienceย and Data Communications, Networks and Distributed Systems fromย University College London.

Books


All Credit goes to Andreas M. Antonopoulos


Shared with ๐Ÿ’š & Admiration by Free Spirit

โœŒ & ๐Ÿ’š


BitHouse with ๐Ÿ’š


Crypto Terminology

Crypto Terminology


Glossary of Terms


Bags

Cryptoassets being held, generally as longer-term plays; sometimes used self-deprecatingly for soft or losing positions one should close, but canโ€™t for whatever reason. โ€œToo bad none of my alt bags saw the moon that I did today. #cryptoeclipseโ€

Bitcoin Maximalists

The truest believers in bitcoinโ€™s original mission and design, often paired with a disdain for altcoins.

Block

Blocks are found in the Bitcoin block chain. Blocks connect all transactions together.

Transactions are combined into single blocks and are verified every ten minutes through mining.

Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).

BIP

Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol.

New features, suggestions, and design changes to the protocol should be submitted as a BIP.

The BIP author is responsible for building consensus within the community and documenting dissenting opinions.

Black Swans

A black swan is an event or occurrence that deviates beyond what is normally expected of a situation and is extremely difficult to predict.

Black swan events are typically random and unexpected.

The term was popularized by Nassim Nicholas Taleb, a finance professor, writer, and former Wall Street trader.

Block Chain

The Bitcoin block chain is a public record of all Bitcoin transactions. You might also hear the term used as a โ€œpublic ledgerโ€.

The block chain shows every single record of bitcoin transactions in order, dating back to the very first one.

The entire block chain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the block chain online.

Block Height

The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the โ€œgenesis blockโ€.

Block Reward

When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network.

The block reward is part of a โ€œcoinbaseโ€ transaction which may also include transaction fees.

The block rewards halves roughly every four years; see also โ€œhalvingโ€.

BTFD | #BTFD

โ€œBuy the Fucking Dipโ€ Advice to other traders to pick up a coin thatโ€™s presumably hit its bottom.

โ€œ$GNT Golem making moves. Underpriced @ 7.5K If U are buying GNT under 10K still a good price 3 X LETS GO $ETH #CRYPTO #trading #BTFDโ€

Change

Letโ€™s say you are spending $9.90 in your local supermarket, and you give the cashier $10.00. You will get back .10 cents in change.

The same logic applies to bitcoin transactions.

Bitcoin transactions are made up of inputs and outputs.

When you send bitcoins, you can only send them in a whole โ€œoutputโ€.

The change is then sent back to the sender.

Cold Storage

The term cold storage is a general term for different ways of securing cryptocurrency offline (disconnected from the internet).

This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions.

The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.

Cold Wallet and Hot Wallet

Cold storage is an offline wallet provided for storing cryptocurrency.

With cold storage, the digital wallet is stored on a platform that is not connected to the internet, thereby, protecting the wallet from unauthorized access, cyber hacks, and other vulnerabilities that a system connected to the internet is susceptible to.

Confirmation

A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining.

Once a transaction is confirmed, it cannot be reversed or double spent.

Transactions are included in blocks.

Cryptocurrency

Cryptocurrency is the broad name for digital currencies that use blockchain technology to work on a peer-to-peer basis.

Cryptocurrencies donโ€™t need a bank to carry out transactions between individuals.

The nature of the blockchain means that individuals can transact with each other, even if they donโ€™t trust each other.

The cryptocurrency network keeps track of all the transactions and ensures that no one tries to renege on a transaction.

Cryptocurrency 2.0

Also known as a decentralized app,(Dapp) a cryptocurrency 2.0 project uses the blockchain for something other than simply creating and sending money.

They typically involve decentralized versions of online services that were previously operated by a trusted third party.

Cryptography

Cryptography is used in multiple places to provide security for the Bitcoin network.

Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the block chain.

Cypherpunk

1. A person with an interest in encryption and privacy, especially one who uses encrypted email.

2. Cypherpunk, a term that appeared in Eric Hughesโ€™ โ€œA Cypherpunkโ€™s Manifestoโ€ in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong  encryption ( ciphertext is encrypted text) to preserve privacy.

Cypherpunk advocates believe that the use of strong encryption algorithms will enable individuals to have safely private transactions.

They oppose any kind of government regulation of cryptography.

They admit the likelihood that criminals and terrorists will exploit the use of strong encryption systems, but accept the risk as the price to be paid for the individualโ€™s right to privacy.

Dark Web

The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

The Dark Web poses new and formidable challenges for law enforcement agencies around the world.

Decentralized

Having a decentralized bitcoin network is a critical aspect.

The network is โ€œdecentralizedโ€, meaning that itโ€™s void of a centralized company or entity that governs the network.

Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.

Difficulty

Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network.

Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks.

Difficulty is automatically adjusted to keep block verification times at ten minutes.

Dogecoin

Dogecoin is an altcoin that first started as a joke in late 2013. Dogecoin, which features a Japanese fighting dog as its mascot, gained a broad international following and quickly grew to have a multi-million dollar market capitalization.

Double Spend

If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.

DYOR | #DYOR

โ€œDo Your Own Research.โ€ The traderโ€™s caveat that advice shouldnโ€™t be taken at face value.

โ€œ$BCY has an appealing risk/reward here. Could take a few months to play out, however, and will require patience. #DYORโ€

Exit Scam

Traditionally a term for darknet markets and vendors that, after building up a good reputation, accumulate bitcoins and disappear; exit scams are also feared by ICO participants who worry that, once theyโ€™ve raised hundreds of millions in hard-to-trace money, the developers will take the money and run.

Fiat

Government-issued money.

Full Node

A full node is when you download the entire block chain using a bitcoin client, and you relay, validate, and secure the data within the block chain.

The data is bitcoin transactions and blocks, which is validated across the entire network of users.

FOMO | #FOMO

โ€œFear of Missing Out.โ€ When a coin starts to moon, dumb money rushes in. โ€œ$LGD on a TEAR right now!!! It has major highs right now! Some major #FOMO going on!!! Sell while itโ€™s high. It WILL drop before fight!!!โ€

FUD

โ€œFear, Uncertainty, and Doubt.โ€

Another non-crypto term that describes attempts to scare weak-handed coin-holders into selling their positions, often with rumors of exit scams or hacks; the cheap, dumped coins are then picked up by the FUD-ers.

Fungibility

Fungibility is a good or assetโ€™s interchangeability with other individual goods or assets of the same type.

Assets possessing this fungibility property simplify the exchange and trade processes, as interchangeability assumes everyone values all goods of that class the same.

HODL

HOLD ON FOR DEAR LIFE!

The intentionally misspelled word hodl has its roots in a December 2013 post on the Bitcoin Talk forum, โ€œI AM HODLINGโ€; when the author, GameKyuubi, couldnโ€™t be bothered to fix his typo, the community instantly turned it into a verb: to hodl.


Along with other terms, hodl is an effective litmus test for sussing out newcomers, carpetbaggers, and tourists.

Halving

Bitcoins have a finite supply, which makes them scarce.

The total amount that will ever be issued is 21 million.

The number of bitcoins generated per block is decreased 50% every 210,000 blocks,roughtly four years.

This is called โ€œhalving.โ€

The final halving will take place in the year 2140.

Hash

A cryptographic hash is a mathematical function that takes a file and produces a relative shortcode that can be used to identify that file.

A hash has a couple of key properties:

โ€ข It is unique. 

Only a particular file can produce a particular hash, and two different files will never produce the same hash.

โ€ข It cannot be reversed.

You canโ€™t work out what a file was by looking at its hash.

Hashing is used to prove that a set of data has not been tampered with.

It is what makes bitcoin mining possible.

Hash Rate

The hash rate is how the Bitcoin mining network processing power is measured.

In order for miners to confirm transactions and secure the block chain, the hardware they use must perform intensive computational operations which is output in hashes per second.

Hash Converter

Use an online hash converter, such as https://hash.online-convert.com and enter the text you want to convert.

Then, try changing just a letter in the input text to see how the resulting hash varies significantly

Hard Fork

A hard fork is when a single cryptocurrency splits in two.

It occurs when a cryptocurrencyโ€™s existing code is changed, resulting in both an old and new version.

Meanwhile a soft fork is essentially the same thing, but the idea is that only one blockchain (and thus one coin) will remain valid as users adopt the update.

So both fork types create a split, but a hard fork is meant to create two blockchain/coins and a soft fork is meant to result in one.

Segwit was a soft fork, Bitcoin Cash, Bitcoin Gold, and Segwit2x are all hard forks.

Immutability

In object-oriented and functional programming, an immutable object (unchangeable object) is an object whose state cannot be modified after it is created.

This is in contrast to a mutable object (changeable object), which can be modified after it is created.

Lambo | #Lambo

A running joke among traders, youโ€™re cryptorich when you can buy a Lamborghini; though absurd, itโ€™s not unheard of โ€” when Alexandre Cazes, the suspected founder of a major darknet marketplace, was found hanged in his Bangkok jail cell, Thai media reported that he owned four Lamborghinis.

Mining

Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions.

Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.

Moon | #Moon

A rapid price increase.

Peer-to-Peer

Typically, online applications are provided by a central party that organizes all the transactions.

Your bank runs its own computers, and all the customers log into the bankโ€™s computer to handle their transactions.

If Bob wants to send money to Alice, he asks the bank to do it, and the bank controls everything.

In a peer-to-peer arrangement, technology cuts out the middleman, meaning that people deal directly with each other.

Bob would send the money directly to Alice, and there wouldnโ€™t be any bank involved at all.

Pool

As part of bitcoin mining, mining โ€œpoolsโ€ are a network of miners that work together to mine a block, then split the block reward among the pool miners.

Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.

Private Key

A private key is a string of data that shows you have access to bitcoins in a specific wallet.

Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.

Proof of Work

Proof of work refers to the hash of a block header (blocks of bitcoin transactions).

A block is considered valid only if its hash is lower than the current target.

Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a block chain.

Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.

Pump

A rapid price increase believed to be the result of market manipulation, a.k.a. pump and dump.

Public Address

A public bitcoin address is cryptographic hash of a public key.

A public address typically starts with the number โ€œ1.โ€

Think of a public address like an email address.

It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.

Private Key

A private key is a string of data that shows you have access to bitcoins in a specific wallet.

Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.

Rekt | #Rekt

Meaning โ€œwreckedโ€.

โ€œI never sell because of #FUD, and I never buy because of #FOMO.

Thatโ€™s the easiest way to get #Rektโ€

Sats

Satoshis, currently the smallest unit of a single bitcoin, useful for tracking coin prices. โ€œAt the rate $XRPโ€™s moving, I wouldnโ€™t be surprised if it hits 10K sats by the end of the day.โ€

Security Tokens

A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.

The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob.

Shitcoins

Pejorative term for altcoins, especially low-cap coins, often affectionately used by shitcoin hodlers.

SEGWIT

SegWit is the process by which the block size limit on a blockchain is increased by removing signature data from Bitcoin transactions.

When certain parts of a transaction are removed, this frees up space or capacity to add more transactions to the chain.

Transaction

A transaction is when data is sent to and from one bitcoin address to another.

Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other.

Bitcoins have value because itโ€™s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies.

Wallet

Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely.

There are many varieties of wallets available, whether youโ€™re looking for a web or mobile solution.

Ideally, a bitcoin wallet will give you access to your public and private keys.

This means that only you have rightful access to spend these bitcoins, whenever you choose to.

Whale

Anyone who owns 5 percent of any given coin, often used as a boogeyman to explain unwanted price movements.

โ€œNice support $NEO. Clear whale manipulation.โ€


Blue Pill vs. Red Pill
Choose wisely

When You’re ready …



BitHouse with ๐Ÿ’š


Beware of CBDC’s People !!!


CBDC Research & Pilots around the world


StableCoins vs. CBDC’s

The Potential Orwellian Horror of Central Bank Digital Currencies

As citizens around the world are confronted with the severe curtailment of political, economic and cultural freedoms associated with COVID-19 risk mitigation strategies (e.g., lockdowns, mandatory vaccinations and/or vaccine passports), new risks to economic freedom and prosperity are quickly emerging which citizens must be aware of and remain vigilant about.

One of these risks which is developing with rapid pace are Central Bank Digital Currencies (CBDCs). According to a Bank of International Settlements (BIS) 2021 survey:

  • 86% of central banks are actively researching the potential for CBDCs;
  • 60% were experimenting with CBDC associated technology; and
  • 14% were deploying CBDC pilot projects.

The development of CBDCs potentially represents one of the largest changes to modern banking and finance (as well as the global financial system) in decades, even though, as noted by the BIS, the concept was proposed by American economist, James Tobin, in 1987.

Current Structure of Currency

As noted by the International Monetary Fund in 2021, economies around the world currently operate under a โ€œdual monetary systemโ€ comprising of:

  • Publicly-issued currency by central banks in the form of physical cash (coins or banknotes) and central bank reserves which constitute legal tender (i.e., form of currency or money which are legally recognised as a means of payment to settle financial obligations such as debts, taxes, contracts, legal fines or damages); and
  • Privately-issued currency by private commercial banks, telecom companies and specialised private payment providers โ€“ that is, digital forms of legal tender that are issued and held by non-government financial institutions (e.g., bank deposits or balances held in payment systems such as Paypal or Alipay).

An important distinction of this dual system is that physical cash and central bank reserves are the liabilities of central banks, whereas privately-issued currency is the liabilities of private sector payment providers.

Definition of CBDCs

CBDCs are digital or virtual forms of physical cash represented through an electronic record or digital token that is issued and regulated by a countryโ€™s central monetary authority (i.e., its central bank) via a centralised ledger.

CBDCs are centralised, which stand in stark contrast to privately-issued cryptocurrencies (such as Bitcoin) which are decentralised and unregulated.

CBDCs are not uniform and central banks have an immense range of legal, technical, operational and administrative design options to achieve their stated public policy objectives. Importantly, the policy intent of CBDCs will be neither uniform across jurisdictions nor static in time. Instead, they will tend to be a function of a countryโ€™s economic, political and social context.

Thus, in assessing whether a proposed CBDC will, in net terms, improve or impair the function of a monetary system and broader economy, each CBDC will require individualised scrutiny and assessment.


NatWest, one of Britainโ€™s largest lenders, is set to appear in court in London to respond to charges that it failed to properly scrutinise a gold-dealing client that deposited ยฃ365m ($502m) with the bankโ€”ยฃ264m of it in cash.

Last year global banks were hit with $10.4bn in fines for money-laundering violations, an increase of more than 80% on 2019, according to Fenergo, a compliance-software firm. In January Capital One, an American bank, was fined $390m for failing to report thousands of fishy transactions. Danske Bank is still dealing with the fallout of a scandal that erupted in 2018. Over $200bn of potentially dirty money was washed through the Danish lenderโ€™s Estonian branch while executives missed or ignored a sea of red flags.


Digital privacy – including financial privacy – is readily available via encrypted communication, and peer-to-peer value transfer solutions. However, the latter quality can scarcely be expected to be implemented in CBDCs by governments eager to control their population.


The continued efforts of central banks to position CBDCs as advancement from analog systems via labels such as โ€˜Digital Dollarโ€™, requires us to point out the obvious: fiat currencies have been predominantly digitally native for decades, and are stored and moved as bytes. A meaningful departure from the current state of banking technology would necessarily have to include the creation of digital bearer instruments which would not depend on the use of middlemen.

However, this would effectively void the need for demand deposit accounts (โ€œchecking accountsโ€) entirely, as the technical limits of bytes are based in physics. In simple terms: any user would be able to move bytes labelled as fiat currency entry from a yield-bearing state to the recipients yield-bearing account.

With that the ability of financial service providers to extract fees from the movement of bytes would vanish, after all users tend to not put stamps on their emails. This, somewhat obvious conclusion, even made it into several CBDC research papers, and promptly caused the commissioning central banks to halt any development of a CBDC, realizing that fees for payments today comprise on average 30% of commercial bank revenues, these institutions would largely seize to exist.


DO NOT LISTEN for anyone’s opinion on this matter !!!

Opinions are a dime a bucket anyway !!!

Not even mine !!!

DO ALWAYS YOUR OWN DILIGENCE AND RESEARCH !!!

And when the time will come… You shall know the best choice to make for you and future generations to come !!!

It’s actually more about them than us !!!

But we will pave the way for them…

Let’s not make it and Dystopical Orwellian one people !!!

IMHO (In My Honest Opinion) CBDC’s are nothing more than “1984” v 2.0 !!!

But who am I ?ยฟ but just a leaf in the wind…

Here below are some links that could be a great place to start making your own Research and due diligence !!!

Sharing is caring they say, so here you are people :


https://hackernoon.com/cbdcs-the-folly-of-digital-fiat


https://cointelegraph.com/news/central-bank-digital-currencies-are-dead-in-the-water


https://www.adamseconomics.com/post/the-potential-orwellian-horror-of-central-bank-digital-currencies


https://news.bitcoin.com/why-the-rise-of-the-cbdc-is-bad-for-your-privacy/


https://restoreprivacy.com/cbdc-central-bank-digital-currency-privacy-implications/


https://bitcoinmagazine.com/markets/england-cbdc-propel-bitcoin


https://hackernoon.com/the-problem-that-is-government-money-bn443tts


https://blog.aryze.io/cbdcs-the-good-the-bad-and-the-ugly/


https://www.bis.org/publ/work880.htm


https://www.economist.com/finance-and-economics/2021/04/12/the-war-against-money-laundering-is-being-lost


To be always Updated !!!



Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š